SlideShare a Scribd company logo
RMK College of Engineering and Technology
CS 6551
Computer Networks
Department
of
Electronics and Communication Engineering
Unit 4
Transport Layer
Prepared by
Jai Ganesh S
Asst.Professor - ECE
Syllabus
• Overview of transport layer
• UDP – User Datagram Protocol
• Reliable Byte Stream – TCP
• Connection management
• Flow control
• Retransmission
• TCP Congestion Control
• Congestion Avoidance
• Quality of Service
• Application Requirements.
Transport Layer
Overview of Transport Layer
• This layer is responsible for process to process delivery of entire message.
• The system runs several process. Transport
layer is responsible for delivering the
message to the correct process.
• This can be achieved by a special type of
address called as “service point address”
IP address vs Port Address
Concept of PORT Addressing
TCP protocols
• There are 2 main protocols used in this layer.
• Connection Less – UDP
• Connection Oriented - TCP
User Datagram Protocol
• This is an connection less un reliable transport layer protocol.
• They have very low error checking features.
UDP packet header
Checksum Calculation
• The UDP check sum has 3 different
sections.
• Pseudo header
• UDP header
• Data from application Layer
Functions of UDP
• Connection less services
• Flow control and error control
• Encapsulation and de capsulation
• Queuing
Uses of UDP
• They are suitable for simple communications where error control and
flow control are little concern
• They are suitable for multicasting
• They are well suited for updating the router information.
End
of
UDP
Reliable Byte Stream
• In contrast to the unreliable transmission protocol we have a reliable byte
stream .
• Protocol used here is “Transmission Control Protocol” (TCP)
TCP Services
• Process to process communication
• Stream delivery service
• Full duplex communication
• Connection oriented service
• Reliable service
1. Process to process communication
• There are few well
known ports for the
process identification.
2. Stream delivery service
• The data are sent as a stream of bytes.
• This creates an virtual connection between the source and the destination.
• Full duplex communication:
• TCP allows full duplex communication in which the data flow in both the directions at the same time.
• Connection Oriented Services:
• Data transmission occurs in 3 stages,
• Connection is established between the source & destination
• Data are exchanged between the source and destination
• Connection is terminated.
• Reliable Services:
• TCP is an reliable protocol.
• It uses an acknowledgement mechanism to check the safe and sound arrival of data
Features of TCP
• Numbering system:
• They have 2 types of numbering system
• Sequence number - to identify the order of the segment
• Acknowledgement number – used to conform the reception of segment and the next segment to be sent.
• Flow control:
• Controls the amount of data sent by the sender to the receiver. To avoid the loss of packets
• Error control:
• TCP implements the error control mechanism to ensure the correct delivery of data.
• Congestion control:
• TCP implements certain strategies to ensure there is no congestion on the network.
TCP Header Format
Connection Management in TCP
• There are 3 phases in connection management.
Connection Establishment
Data transfer
Connection termination
1. Connection Establishment
• Connection is established by a 3
way handshaking process.
• Consider the scenario shown in the
figure, where client need to
establish a connection with the
server.
2. Data transfer
• After the connection is established , data
can flow in bi direction.
• The client and server can send data and
ACK
• The figure shows the timing diagram for
the data transfer phase.
3. Connection Termination
• Connection termination also happens in
3 way handshaking process.
• The client ends the termination by
sending FIN signal and the same is
acknowledged from the server.
End of
Connection Management
Flow Control in TCP
• TCP uses sliding window to handle the flow control
• The major difference between the sliding window flow control in data link layer
and the Transport layer is as follows
• Byte oriented in TCP, Frame oriented in DLL
• Window size is variable in TCP, Fixed in DLL
• A window can be opened, Closed or Shrink.
• Opening a window:
• Moving the right wall to the right. This allows new bits to be added for sending.
• Closing a window:
• Moving left wall to the right. Represents that the bytes are acknowledged.
• Shrinking a window:
• Moving right wall to the left. Revoking the eligibility of bytes for sending. Problem occurs when the bytes are
already sent.
• Size of the window is determined by 2 parameters.
• Receiver window (rwnd) – No of bytes that the receiver can accept.
• Congestion window (cwnd) – No of bytes that the network can carry without
any congestion.
• The window size should be a function of rwnd and cwnd
Transmission Process
• There are 3 mechanisms in transmission process.
Deciding the “Maximum Segment Size” (MSS)
Flushing the bytes into the buffer.
Firing the Timer for retransmission purpose.
Silly Window Syndrome
• Generally receiver decides the window size.
• If the available data and receiver window size is same as MSS, no problem will occur.
• In case the transmitter accumulates the data bytes and waiting for the window size from the receiver.
• Now the receiver sends the window size as MSS/2 (Half the Size of the MSS).
• Now the problem occurs at the transmitter that it has to send MSS/2 bytes of data….. Or to wait for some more period to get the
full MSS window size. So that the complete data is transmitted.
• This confusion leads to a problem called as “Silly Window Syndrome”.
Solution for this problem is : “Nagle’s Algorithm”
• If sender waits too long --> bad for interactive connections.
• If it does not wait long enough --> silly window syndrome.
• How to solve ?
Nagle’sAlgorithm
• If both available data and Window ≥ MSS, send full segment.
• Else, if there is un ACK ed data in flight, buffer new data until ACK
returns.
• Else, send new data now.
End
of
Flow Control
Retransmission
• Reliable data transmission is achieved by retransmitting the
segments.
• The key factor in implementing the retransmission is deciding the
Time Out Period
• The default method for setting up the Time out period
is double the period of Round Trip Time between any 2
nodes on the network
Problem with RTT
• Unfortunately the RTT between any 2 nodes on the network gets varied
because of several factors
Solution
• To eliminate this problem, TCP uses an “Adaptive
Retransmission Technique”.
• Where the Time out Period is adjusted according to the
situations.
• Several algorithms were proposed on calculating the time out period
• Original Algorithm
• Karn / Parteidge Algorithm
• Jacobson / Karels Algorithm
1. Original Algorithm
• This is an simple algorithm, in which the sample time is computed for every segment sent.
• This sample time is related with the previously computed values and the final time out period
is computed as shown below
Drawbacks of Original Algorithm
• RTT cannot be simply calculated only based on the received ACK.
• We cannot identify the received ACK is for the original Transmission or the
Retransmitted Segment
• Consider the given scenarios.
• Case 1: ACK Sent by the Receiver is lost – segment retransmitted – received
ACK is assumed for the original transmission – Sample RTT is too long.
• Case 2: ACK is delayed by the Received – Segment Retransmitted – received
ACK is assumed for the retransmitted segment – Sample RTT is too short.
2. Karn / Parteidge Algorithm
• This algorithm overcomes the drawback of the original algorithm.
• This algorithm proposes that the RTT is computed only for the segments that
are sent for the first time. (Not for the Retransmitted Segments)
• The Final time out is computed based only on the sample RTT’s of first time
sent segments
3. Jacobson / Karels Algorithm
• This algorithm serves better than the predecessor method.
• This algorithm considers the variance of sample RTT’s in to account.
• Variance -- ?
What’s Mean
What’s Variance
End
of
Retransmission
TCP Congestion Control
Congestion Control
• It is very important factor to control the congestion on the network.
• Congestion occurs when the network is overloaded.
• Thus to control the congestion the flow of packets should be controlled according to the
network capacity.
• There are several techniques available. Out of which few techniques are discussed here.
• Adaptive Increase and Multiplicative Decrease.
• Slow Start
• Fast Retransmit and Fast Recovery
Adaptive Increase and Multiplicative Decrease. (AIDM)
• TCP maintains the congestion window size which
decides the amount of data to be transmitted.
• The size of this window can be increased or
decreased according to the occurrence of
congestion on the network.
Operation of AIDM
• AIDM performs slow increase in the congestion
window size when the congestion is less.
• AIDM performs sudden drop in the congestion
window size when there is a congestion on the
network
2. Slow Start Method
• The draw back with the previous method is that, the system take too long time to reach the
optimum flow level.
• This methods initially sets the window size to 1 and when the ACK is received, then it
doubles the window size.
• This method is well suited in 2 conditions
• Initial stage of the transmission when the system do not know anything about the capacity of the
network.
• When the line is down for a while and again back on to service.
Fast retransmit and Fast Recovery
• Fast Retransmit:
• The convention system waits for the time out period to
retransmit the lost frame.
• Instead to speed up the process Fast retransmit is used.
• In this method the receivers send the previous copy of ACK
to the sender to intimate the loss of packets.
• When the receiver keeps on receiving the Duplicate ACK
then the frame is Retransmitted.
Packet 1
Packet 2
Packet 3
Packet 4
Packet 5
Packet 6
Retransmit
packet 3
ACK 1
ACK 2
ACK 2
ACK 2
ACK 6
ACK 2
Sender Receiver
• Fast Recovery:
• This methods modifies the operation of slow start method.
• This methods reduces the size of the congestion window to half, Instead of starting form
the beginning.
• This method helps in fast recovery of the system when there is any occurrence of
congestion in the network.
End
of
Congestion Control
Congestion Avoidance
Introduction
• The previously discussed control mechanisms
measures the amount of congestion occurred in the
network and take steps to control.
• But it is always better to avoid congestion than
controlling.
Congestion avoidance Mechanisms
• There are several congestion avoidance mechanisms proposed. Few of
them are discussed here.
• Destination experiencing Congestion Bit (DEC Bit)
• Random Early Detection (RED).
• Source Based Congestion Avoidance.
DEC Bit
• This system introduces an congestion bit to the packets transmitted by the sender.
• This bit can either set or reset according to the congestion level.
• This bit is set when the queue length if more than 50%.
• When the receiver detects the congestion bit is set then the window size is reduced by 0.875
times the original value.
• When the queue length is less than 50% then the congestion window size is incremented by 1
byte.
Random Early Detection
• This bit avoids congestion by dropping the
packets.
• This method measures the queue length and
fixes minimum threshold and maximum
threshold values.
• When the queue length is below the minimum threshold value then no packets
are dropped.
• When the queue length lies between the minimum and maximum threshold
values then the packets are dropped according to the predefined configuration.
• When the queue length is above the maximum threshold level then all the packets
are dropped.
End
of
Congestion Avoidance
Quality of service (QoS)
QoS - Introduction
• Qos deals with the regular flow of data throughout the network.
• There are several mechanisms incorporated to improve the QoS.
• Scheduling
• Traffic shaping
• Admission control
• Resource reservation.
1. Scheduling
• Scheduling is nothing but prioritizing the various flow of packets.
• There are 3 methods.
• First In First Out Queuing (FIFO)
• Priority Queuing
• Weighted Priority Queuing
FIFO Queuing
Priority Queuing
Weighted Priority Queuing
2. Traffic Shaping
• This method regulates the flow of data from various rates of flow of
packets.
• This can be implemented by 2 techniques.
• Leaky Bucket Mechanism
• Token Bucket Mechanism
Leaky Bucket Mechanism
Leaky Bucket Implementation
Token Bucket Mechanism
• Packets will be sent based on the token system
• Each packet consumes one token.
• The ideal time of the node are effectively utilised in this mechanism
Token Bucket Mechanism
3. Admission Control
• Packets will be accepted or rejected based on the pre defined configuration.
• If the packet passes the test then the packet is accepted. Else rejected.
4. Resource Reservation
• Network resources like bandwidth, queue memory can be reserved before hand for priority
applications .
End
of
QoS
Application Requirements
Application Requirements
• It is first important to classify the types of application for choosing the
requirements.
• Real Time Applications
• Non – Real Time Applicaations
Real Time Applications
• The best examples of real time applications are Audio transmission.
• In this applications the minimum delay are most important requirement
than any other parameters.
Non Real time applications
• Such kind of applications do not require minimum delay as the important requirement.
• The parameters like security, correct delivery can be important requirements based on the applications
• Email, FTP and HTTP are few examples of Non Real time Applications.
Approaches for Deciding the QoS
• There are 2 main approaches in providing the QoS.
• Fine Grained Approach
• Provides QoS for individual Applications
• Coarse Grained Approach
• Provides QoS for large class of data or Aggregate Traffic.
End
of
Application Requirements
&
Unit - 4

More Related Content

What's hot

Computer Networks - Error Detection & Error Correction
Computer Networks - Error Detection & Error CorrectionComputer Networks - Error Detection & Error Correction
Computer Networks - Error Detection & Error Correction
Saikrishna Tanguturu
 
Chapter 4 data link layer
Chapter 4 data link layerChapter 4 data link layer
Chapter 4 data link layer
Naiyan Noor
 
Congestion control
Congestion controlCongestion control
Congestion control
Aman Jaiswal
 
Packet switching
Packet switchingPacket switching
Packet switching
asimnawaz54
 
data-link layer protocols
data-link layer protocols  data-link layer protocols
data-link layer protocols
BE Smârt
 
Classification of routing protocols
Classification of routing protocolsClassification of routing protocols
Classification of routing protocols
Menaga Selvaraj
 
Csma cd and csma-ca
Csma cd and csma-caCsma cd and csma-ca
Csma cd and csma-ca
kazim Hussain
 
Global state recording in Distributed Systems
Global state recording in Distributed SystemsGlobal state recording in Distributed Systems
Global state recording in Distributed Systems
Arsnet
 
Mac protocols for ad hoc wireless networks
Mac protocols for ad hoc wireless networks Mac protocols for ad hoc wireless networks
Mac protocols for ad hoc wireless networks
Divya Tiwari
 
Distance Vector Routing Protocols
Distance Vector Routing ProtocolsDistance Vector Routing Protocols
Distance Vector Routing Protocols
KABILESH RAMAR
 
Computer Networks Unit 1 Introduction and Physical Layer
Computer Networks Unit 1 Introduction and Physical Layer Computer Networks Unit 1 Introduction and Physical Layer
Computer Networks Unit 1 Introduction and Physical Layer
Dr. SELVAGANESAN S
 
WCDMA
WCDMAWCDMA
Unit 3 Network Layer PPT
Unit 3 Network Layer PPTUnit 3 Network Layer PPT
Unit 3 Network Layer PPT
KalpanaC14
 
Fisheye State Routing (FSR) - Protocol Overview
Fisheye State Routing (FSR) - Protocol OverviewFisheye State Routing (FSR) - Protocol Overview
Fisheye State Routing (FSR) - Protocol Overview
Yoav Francis
 
Computer networks network layer,routing
Computer networks network layer,routingComputer networks network layer,routing
Computer networks network layer,routing
Deepak John
 
Leaky Bucket & Tocken Bucket - Traffic shaping
Leaky Bucket & Tocken Bucket - Traffic shapingLeaky Bucket & Tocken Bucket - Traffic shaping
Leaky Bucket & Tocken Bucket - Traffic shaping
Vimal Dewangan
 
SENSOR NETWORK PLATFORMS AND TOOLS
SENSOR NETWORK PLATFORMS AND TOOLSSENSOR NETWORK PLATFORMS AND TOOLS
SENSOR NETWORK PLATFORMS AND TOOLS
juno susi
 
Congestion control in TCP
Congestion control in TCPCongestion control in TCP
Congestion control in TCP
selvakumar_b1985
 
Mobility management in adhoc network
Mobility management in adhoc networkMobility management in adhoc network
Mobility management in adhoc network
Aman Saurabh
 
Routing algorithm
Routing algorithmRouting algorithm
Routing algorithm
Bushra M
 

What's hot (20)

Computer Networks - Error Detection & Error Correction
Computer Networks - Error Detection & Error CorrectionComputer Networks - Error Detection & Error Correction
Computer Networks - Error Detection & Error Correction
 
Chapter 4 data link layer
Chapter 4 data link layerChapter 4 data link layer
Chapter 4 data link layer
 
Congestion control
Congestion controlCongestion control
Congestion control
 
Packet switching
Packet switchingPacket switching
Packet switching
 
data-link layer protocols
data-link layer protocols  data-link layer protocols
data-link layer protocols
 
Classification of routing protocols
Classification of routing protocolsClassification of routing protocols
Classification of routing protocols
 
Csma cd and csma-ca
Csma cd and csma-caCsma cd and csma-ca
Csma cd and csma-ca
 
Global state recording in Distributed Systems
Global state recording in Distributed SystemsGlobal state recording in Distributed Systems
Global state recording in Distributed Systems
 
Mac protocols for ad hoc wireless networks
Mac protocols for ad hoc wireless networks Mac protocols for ad hoc wireless networks
Mac protocols for ad hoc wireless networks
 
Distance Vector Routing Protocols
Distance Vector Routing ProtocolsDistance Vector Routing Protocols
Distance Vector Routing Protocols
 
Computer Networks Unit 1 Introduction and Physical Layer
Computer Networks Unit 1 Introduction and Physical Layer Computer Networks Unit 1 Introduction and Physical Layer
Computer Networks Unit 1 Introduction and Physical Layer
 
WCDMA
WCDMAWCDMA
WCDMA
 
Unit 3 Network Layer PPT
Unit 3 Network Layer PPTUnit 3 Network Layer PPT
Unit 3 Network Layer PPT
 
Fisheye State Routing (FSR) - Protocol Overview
Fisheye State Routing (FSR) - Protocol OverviewFisheye State Routing (FSR) - Protocol Overview
Fisheye State Routing (FSR) - Protocol Overview
 
Computer networks network layer,routing
Computer networks network layer,routingComputer networks network layer,routing
Computer networks network layer,routing
 
Leaky Bucket & Tocken Bucket - Traffic shaping
Leaky Bucket & Tocken Bucket - Traffic shapingLeaky Bucket & Tocken Bucket - Traffic shaping
Leaky Bucket & Tocken Bucket - Traffic shaping
 
SENSOR NETWORK PLATFORMS AND TOOLS
SENSOR NETWORK PLATFORMS AND TOOLSSENSOR NETWORK PLATFORMS AND TOOLS
SENSOR NETWORK PLATFORMS AND TOOLS
 
Congestion control in TCP
Congestion control in TCPCongestion control in TCP
Congestion control in TCP
 
Mobility management in adhoc network
Mobility management in adhoc networkMobility management in adhoc network
Mobility management in adhoc network
 
Routing algorithm
Routing algorithmRouting algorithm
Routing algorithm
 

Similar to Computer networks unit iv

New framing-protocols
New framing-protocolsNew framing-protocols
New framing-protocols
Nitesh Singh
 
Introduction to TCP
Introduction to TCPIntroduction to TCP
Introduction to TCP
Pradeep Kumar TS
 
Dcn ppt by roma
Dcn ppt by romaDcn ppt by roma
Dcn ppt by roma
boraroma
 
Computer network transport layer MODUL 2.pptx
Computer network transport layer MODUL 2.pptxComputer network transport layer MODUL 2.pptx
Computer network transport layer MODUL 2.pptx
pallavir61
 
TCP protocol flow control
TCP protocol flow control TCP protocol flow control
TCP protocol flow control
anuragjagetiya
 
Transport layer
Transport layerTransport layer
Transport layer
arvind pandey
 
Dcn ppt on data link layer
Dcn ppt on data link layerDcn ppt on data link layer
Dcn ppt on data link layer
roma bora
 
Transmission control protocol
Transmission control protocolTransmission control protocol
Transmission control protocol
Sundra Anand
 
Computer networks transport layer
Computer networks  transport layerComputer networks  transport layer
Computer networks transport layer
jamunaashok
 
Module 2.pptx.............sdvsdcdssdfsdf
Module 2.pptx.............sdvsdcdssdfsdfModule 2.pptx.............sdvsdcdssdfsdf
Module 2.pptx.............sdvsdcdssdfsdf
Shivakrishnan18
 
Computer network coe351- part4- final
Computer network coe351- part4- finalComputer network coe351- part4- final
Computer network coe351- part4- final
Taymoor Nazmy
 
Flow control
Flow controlFlow control
Flow control
STEFFY D
 
Data link layer
Data link layerData link layer
Data link layer
sbkbca
 
Lecture 2 data link layer 1 v1
Lecture 2 data link layer 1 v1Lecture 2 data link layer 1 v1
Lecture 2 data link layer 1 v1
Ronoh Kennedy
 
Unit-4 (1).pptx
Unit-4 (1).pptxUnit-4 (1).pptx
Unit-4 (1).pptx
poonamsngr
 
Tcp(no ip) review part1
Tcp(no ip) review part1Tcp(no ip) review part1
Tcp(no ip) review part1
Diptanshu singh
 
CN Unit 2 - cs8591.pptx
CN Unit 2 - cs8591.pptxCN Unit 2 - cs8591.pptx
CN Unit 2 - cs8591.pptx
Pondinesh2
 
DLC_23 (3).pptx
DLC_23 (3).pptxDLC_23 (3).pptx
DLC_23 (3).pptx
zulhelmanz
 
Unit 4-Transport Layer Protocols-3.pptx
Unit 4-Transport Layer Protocols-3.pptxUnit 4-Transport Layer Protocols-3.pptx
Unit 4-Transport Layer Protocols-3.pptx
DESTROYER39
 
Unit 4-Transport Layer Protocols.pptx
Unit 4-Transport Layer Protocols.pptxUnit 4-Transport Layer Protocols.pptx
Unit 4-Transport Layer Protocols.pptx
sarosh32
 

Similar to Computer networks unit iv (20)

New framing-protocols
New framing-protocolsNew framing-protocols
New framing-protocols
 
Introduction to TCP
Introduction to TCPIntroduction to TCP
Introduction to TCP
 
Dcn ppt by roma
Dcn ppt by romaDcn ppt by roma
Dcn ppt by roma
 
Computer network transport layer MODUL 2.pptx
Computer network transport layer MODUL 2.pptxComputer network transport layer MODUL 2.pptx
Computer network transport layer MODUL 2.pptx
 
TCP protocol flow control
TCP protocol flow control TCP protocol flow control
TCP protocol flow control
 
Transport layer
Transport layerTransport layer
Transport layer
 
Dcn ppt on data link layer
Dcn ppt on data link layerDcn ppt on data link layer
Dcn ppt on data link layer
 
Transmission control protocol
Transmission control protocolTransmission control protocol
Transmission control protocol
 
Computer networks transport layer
Computer networks  transport layerComputer networks  transport layer
Computer networks transport layer
 
Module 2.pptx.............sdvsdcdssdfsdf
Module 2.pptx.............sdvsdcdssdfsdfModule 2.pptx.............sdvsdcdssdfsdf
Module 2.pptx.............sdvsdcdssdfsdf
 
Computer network coe351- part4- final
Computer network coe351- part4- finalComputer network coe351- part4- final
Computer network coe351- part4- final
 
Flow control
Flow controlFlow control
Flow control
 
Data link layer
Data link layerData link layer
Data link layer
 
Lecture 2 data link layer 1 v1
Lecture 2 data link layer 1 v1Lecture 2 data link layer 1 v1
Lecture 2 data link layer 1 v1
 
Unit-4 (1).pptx
Unit-4 (1).pptxUnit-4 (1).pptx
Unit-4 (1).pptx
 
Tcp(no ip) review part1
Tcp(no ip) review part1Tcp(no ip) review part1
Tcp(no ip) review part1
 
CN Unit 2 - cs8591.pptx
CN Unit 2 - cs8591.pptxCN Unit 2 - cs8591.pptx
CN Unit 2 - cs8591.pptx
 
DLC_23 (3).pptx
DLC_23 (3).pptxDLC_23 (3).pptx
DLC_23 (3).pptx
 
Unit 4-Transport Layer Protocols-3.pptx
Unit 4-Transport Layer Protocols-3.pptxUnit 4-Transport Layer Protocols-3.pptx
Unit 4-Transport Layer Protocols-3.pptx
 
Unit 4-Transport Layer Protocols.pptx
Unit 4-Transport Layer Protocols.pptxUnit 4-Transport Layer Protocols.pptx
Unit 4-Transport Layer Protocols.pptx
 

More from JAIGANESH SEKAR

Ec8551 communication networks mcq question bank
Ec8551   communication networks mcq question bank Ec8551   communication networks mcq question bank
Ec8551 communication networks mcq question bank
JAIGANESH SEKAR
 
2.3b access control random access methods - part 3 - csma ca
2.3b access control   random access methods - part 3 - csma ca2.3b access control   random access methods - part 3 - csma ca
2.3b access control random access methods - part 3 - csma ca
JAIGANESH SEKAR
 
2.10b network layer services i pv4 - variable length subnetting
2.10b network layer services  i pv4 - variable length subnetting2.10b network layer services  i pv4 - variable length subnetting
2.10b network layer services i pv4 - variable length subnetting
JAIGANESH SEKAR
 
2.10a network layer services i pv4 - fixed length subnetting
2.10a network layer services  i pv4 - fixed length subnetting2.10a network layer services  i pv4 - fixed length subnetting
2.10a network layer services i pv4 - fixed length subnetting
JAIGANESH SEKAR
 
2.10 network layer services i pv4
2.10 network layer services  i pv42.10 network layer services  i pv4
2.10 network layer services i pv4
JAIGANESH SEKAR
 
2.9 network layer services packet switching
2.9 network layer services   packet switching2.9 network layer services   packet switching
2.9 network layer services packet switching
JAIGANESH SEKAR
 
2.8 bluetooth ieee 802.15
2.8 bluetooth   ieee 802.152.8 bluetooth   ieee 802.15
2.8 bluetooth ieee 802.15
JAIGANESH SEKAR
 
2.7 wlan ieee 802.11
2.7 wlan   ieee 802.112.7 wlan   ieee 802.11
2.7 wlan ieee 802.11
JAIGANESH SEKAR
 
2.6 ethernet ieee 802.3
2.6 ethernet   ieee 802.32.6 ethernet   ieee 802.3
2.6 ethernet ieee 802.3
JAIGANESH SEKAR
 
2.5 access control channelization methods
2.5 access control   channelization methods2.5 access control   channelization methods
2.5 access control channelization methods
JAIGANESH SEKAR
 
2.4 access control controlled access methods
2.4 access control   controlled access methods2.4 access control   controlled access methods
2.4 access control controlled access methods
JAIGANESH SEKAR
 
2.3a access control random access methods - part 2 - csma cd
2.3a access control   random access methods - part 2 - csma cd2.3a access control   random access methods - part 2 - csma cd
2.3a access control random access methods - part 2 - csma cd
JAIGANESH SEKAR
 
2.3 access control random access methods - part 1
2.3 access control   random access methods - part 12.3 access control   random access methods - part 1
2.3 access control random access methods - part 1
JAIGANESH SEKAR
 
2.2 flow control
2.2 flow control2.2 flow control
2.2 flow control
JAIGANESH SEKAR
 
2.1 framing
2.1 framing2.1 framing
2.1 framing
JAIGANESH SEKAR
 
9. data link layer error correction codes - hamming code
9. data link layer   error correction codes - hamming code9. data link layer   error correction codes - hamming code
9. data link layer error correction codes - hamming code
JAIGANESH SEKAR
 
8. data link layer error detection and correction codes - crc
8. data link layer   error detection and correction codes - crc8. data link layer   error detection and correction codes - crc
8. data link layer error detection and correction codes - crc
JAIGANESH SEKAR
 
7. data link layer error detection and correction codes - parity and checksum
7. data link layer   error detection and correction codes - parity and checksum7. data link layer   error detection and correction codes - parity and checksum
7. data link layer error detection and correction codes - parity and checksum
JAIGANESH SEKAR
 
6. data link layer physical addressing
6. data link layer   physical addressing6. data link layer   physical addressing
6. data link layer physical addressing
JAIGANESH SEKAR
 
5. protocol layering
5. protocol layering5. protocol layering
5. protocol layering
JAIGANESH SEKAR
 

More from JAIGANESH SEKAR (20)

Ec8551 communication networks mcq question bank
Ec8551   communication networks mcq question bank Ec8551   communication networks mcq question bank
Ec8551 communication networks mcq question bank
 
2.3b access control random access methods - part 3 - csma ca
2.3b access control   random access methods - part 3 - csma ca2.3b access control   random access methods - part 3 - csma ca
2.3b access control random access methods - part 3 - csma ca
 
2.10b network layer services i pv4 - variable length subnetting
2.10b network layer services  i pv4 - variable length subnetting2.10b network layer services  i pv4 - variable length subnetting
2.10b network layer services i pv4 - variable length subnetting
 
2.10a network layer services i pv4 - fixed length subnetting
2.10a network layer services  i pv4 - fixed length subnetting2.10a network layer services  i pv4 - fixed length subnetting
2.10a network layer services i pv4 - fixed length subnetting
 
2.10 network layer services i pv4
2.10 network layer services  i pv42.10 network layer services  i pv4
2.10 network layer services i pv4
 
2.9 network layer services packet switching
2.9 network layer services   packet switching2.9 network layer services   packet switching
2.9 network layer services packet switching
 
2.8 bluetooth ieee 802.15
2.8 bluetooth   ieee 802.152.8 bluetooth   ieee 802.15
2.8 bluetooth ieee 802.15
 
2.7 wlan ieee 802.11
2.7 wlan   ieee 802.112.7 wlan   ieee 802.11
2.7 wlan ieee 802.11
 
2.6 ethernet ieee 802.3
2.6 ethernet   ieee 802.32.6 ethernet   ieee 802.3
2.6 ethernet ieee 802.3
 
2.5 access control channelization methods
2.5 access control   channelization methods2.5 access control   channelization methods
2.5 access control channelization methods
 
2.4 access control controlled access methods
2.4 access control   controlled access methods2.4 access control   controlled access methods
2.4 access control controlled access methods
 
2.3a access control random access methods - part 2 - csma cd
2.3a access control   random access methods - part 2 - csma cd2.3a access control   random access methods - part 2 - csma cd
2.3a access control random access methods - part 2 - csma cd
 
2.3 access control random access methods - part 1
2.3 access control   random access methods - part 12.3 access control   random access methods - part 1
2.3 access control random access methods - part 1
 
2.2 flow control
2.2 flow control2.2 flow control
2.2 flow control
 
2.1 framing
2.1 framing2.1 framing
2.1 framing
 
9. data link layer error correction codes - hamming code
9. data link layer   error correction codes - hamming code9. data link layer   error correction codes - hamming code
9. data link layer error correction codes - hamming code
 
8. data link layer error detection and correction codes - crc
8. data link layer   error detection and correction codes - crc8. data link layer   error detection and correction codes - crc
8. data link layer error detection and correction codes - crc
 
7. data link layer error detection and correction codes - parity and checksum
7. data link layer   error detection and correction codes - parity and checksum7. data link layer   error detection and correction codes - parity and checksum
7. data link layer error detection and correction codes - parity and checksum
 
6. data link layer physical addressing
6. data link layer   physical addressing6. data link layer   physical addressing
6. data link layer physical addressing
 
5. protocol layering
5. protocol layering5. protocol layering
5. protocol layering
 

Recently uploaded

6th International Conference on Machine Learning & Applications (CMLA 2024)
6th International Conference on Machine Learning & Applications (CMLA 2024)6th International Conference on Machine Learning & Applications (CMLA 2024)
6th International Conference on Machine Learning & Applications (CMLA 2024)
ClaraZara1
 
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECTCHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
jpsjournal1
 
IEEE Aerospace and Electronic Systems Society as a Graduate Student Member
IEEE Aerospace and Electronic Systems Society as a Graduate Student MemberIEEE Aerospace and Electronic Systems Society as a Graduate Student Member
IEEE Aerospace and Electronic Systems Society as a Graduate Student Member
VICTOR MAESTRE RAMIREZ
 
Modelagem de um CSTR com reação endotermica.pdf
Modelagem de um CSTR com reação endotermica.pdfModelagem de um CSTR com reação endotermica.pdf
Modelagem de um CSTR com reação endotermica.pdf
camseq
 
14 Template Contractual Notice - EOT Application
14 Template Contractual Notice - EOT Application14 Template Contractual Notice - EOT Application
14 Template Contractual Notice - EOT Application
SyedAbiiAzazi1
 
New techniques for characterising damage in rock slopes.pdf
New techniques for characterising damage in rock slopes.pdfNew techniques for characterising damage in rock slopes.pdf
New techniques for characterising damage in rock slopes.pdf
wisnuprabawa3
 
Wearable antenna for antenna applications
Wearable antenna for antenna applicationsWearable antenna for antenna applications
Wearable antenna for antenna applications
Madhumitha Jayaram
 
Question paper of renewable energy sources
Question paper of renewable energy sourcesQuestion paper of renewable energy sources
Question paper of renewable energy sources
mahammadsalmanmech
 
[JPP-1] - (JEE 3.0) - Kinematics 1D - 14th May..pdf
[JPP-1] - (JEE 3.0) - Kinematics 1D - 14th May..pdf[JPP-1] - (JEE 3.0) - Kinematics 1D - 14th May..pdf
[JPP-1] - (JEE 3.0) - Kinematics 1D - 14th May..pdf
awadeshbabu
 
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressionsKuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
Victor Morales
 
A SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMS
A SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMSA SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMS
A SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMS
IJNSA Journal
 
CSM Cloud Service Management Presentarion
CSM Cloud Service Management PresentarionCSM Cloud Service Management Presentarion
CSM Cloud Service Management Presentarion
rpskprasana
 
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdfBPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
MIGUELANGEL966976
 
Literature Review Basics and Understanding Reference Management.pptx
Literature Review Basics and Understanding Reference Management.pptxLiterature Review Basics and Understanding Reference Management.pptx
Literature Review Basics and Understanding Reference Management.pptx
Dr Ramhari Poudyal
 
5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...
5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...
5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...
ihlasbinance2003
 
Exception Handling notes in java exception
Exception Handling notes in java exceptionException Handling notes in java exception
Exception Handling notes in java exception
Ratnakar Mikkili
 
ACRP 4-09 Risk Assessment Method to Support Modification of Airfield Separat...
ACRP 4-09 Risk Assessment Method to Support Modification of Airfield Separat...ACRP 4-09 Risk Assessment Method to Support Modification of Airfield Separat...
ACRP 4-09 Risk Assessment Method to Support Modification of Airfield Separat...
Mukeshwaran Balu
 
Low power architecture of logic gates using adiabatic techniques
Low power architecture of logic gates using adiabatic techniquesLow power architecture of logic gates using adiabatic techniques
Low power architecture of logic gates using adiabatic techniques
nooriasukmaningtyas
 
bank management system in java and mysql report1.pdf
bank management system in java and mysql report1.pdfbank management system in java and mysql report1.pdf
bank management system in java and mysql report1.pdf
Divyam548318
 
A review on techniques and modelling methodologies used for checking electrom...
A review on techniques and modelling methodologies used for checking electrom...A review on techniques and modelling methodologies used for checking electrom...
A review on techniques and modelling methodologies used for checking electrom...
nooriasukmaningtyas
 

Recently uploaded (20)

6th International Conference on Machine Learning & Applications (CMLA 2024)
6th International Conference on Machine Learning & Applications (CMLA 2024)6th International Conference on Machine Learning & Applications (CMLA 2024)
6th International Conference on Machine Learning & Applications (CMLA 2024)
 
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECTCHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
 
IEEE Aerospace and Electronic Systems Society as a Graduate Student Member
IEEE Aerospace and Electronic Systems Society as a Graduate Student MemberIEEE Aerospace and Electronic Systems Society as a Graduate Student Member
IEEE Aerospace and Electronic Systems Society as a Graduate Student Member
 
Modelagem de um CSTR com reação endotermica.pdf
Modelagem de um CSTR com reação endotermica.pdfModelagem de um CSTR com reação endotermica.pdf
Modelagem de um CSTR com reação endotermica.pdf
 
14 Template Contractual Notice - EOT Application
14 Template Contractual Notice - EOT Application14 Template Contractual Notice - EOT Application
14 Template Contractual Notice - EOT Application
 
New techniques for characterising damage in rock slopes.pdf
New techniques for characterising damage in rock slopes.pdfNew techniques for characterising damage in rock slopes.pdf
New techniques for characterising damage in rock slopes.pdf
 
Wearable antenna for antenna applications
Wearable antenna for antenna applicationsWearable antenna for antenna applications
Wearable antenna for antenna applications
 
Question paper of renewable energy sources
Question paper of renewable energy sourcesQuestion paper of renewable energy sources
Question paper of renewable energy sources
 
[JPP-1] - (JEE 3.0) - Kinematics 1D - 14th May..pdf
[JPP-1] - (JEE 3.0) - Kinematics 1D - 14th May..pdf[JPP-1] - (JEE 3.0) - Kinematics 1D - 14th May..pdf
[JPP-1] - (JEE 3.0) - Kinematics 1D - 14th May..pdf
 
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressionsKuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
 
A SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMS
A SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMSA SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMS
A SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMS
 
CSM Cloud Service Management Presentarion
CSM Cloud Service Management PresentarionCSM Cloud Service Management Presentarion
CSM Cloud Service Management Presentarion
 
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdfBPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
 
Literature Review Basics and Understanding Reference Management.pptx
Literature Review Basics and Understanding Reference Management.pptxLiterature Review Basics and Understanding Reference Management.pptx
Literature Review Basics and Understanding Reference Management.pptx
 
5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...
5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...
5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...
 
Exception Handling notes in java exception
Exception Handling notes in java exceptionException Handling notes in java exception
Exception Handling notes in java exception
 
ACRP 4-09 Risk Assessment Method to Support Modification of Airfield Separat...
ACRP 4-09 Risk Assessment Method to Support Modification of Airfield Separat...ACRP 4-09 Risk Assessment Method to Support Modification of Airfield Separat...
ACRP 4-09 Risk Assessment Method to Support Modification of Airfield Separat...
 
Low power architecture of logic gates using adiabatic techniques
Low power architecture of logic gates using adiabatic techniquesLow power architecture of logic gates using adiabatic techniques
Low power architecture of logic gates using adiabatic techniques
 
bank management system in java and mysql report1.pdf
bank management system in java and mysql report1.pdfbank management system in java and mysql report1.pdf
bank management system in java and mysql report1.pdf
 
A review on techniques and modelling methodologies used for checking electrom...
A review on techniques and modelling methodologies used for checking electrom...A review on techniques and modelling methodologies used for checking electrom...
A review on techniques and modelling methodologies used for checking electrom...
 

Computer networks unit iv

  • 1. RMK College of Engineering and Technology CS 6551 Computer Networks Department of Electronics and Communication Engineering
  • 2. Unit 4 Transport Layer Prepared by Jai Ganesh S Asst.Professor - ECE
  • 3. Syllabus • Overview of transport layer • UDP – User Datagram Protocol • Reliable Byte Stream – TCP • Connection management • Flow control • Retransmission • TCP Congestion Control • Congestion Avoidance • Quality of Service • Application Requirements.
  • 5. Overview of Transport Layer • This layer is responsible for process to process delivery of entire message. • The system runs several process. Transport layer is responsible for delivering the message to the correct process. • This can be achieved by a special type of address called as “service point address”
  • 6. IP address vs Port Address
  • 7. Concept of PORT Addressing
  • 8. TCP protocols • There are 2 main protocols used in this layer. • Connection Less – UDP • Connection Oriented - TCP
  • 9. User Datagram Protocol • This is an connection less un reliable transport layer protocol. • They have very low error checking features.
  • 11. Checksum Calculation • The UDP check sum has 3 different sections. • Pseudo header • UDP header • Data from application Layer
  • 12. Functions of UDP • Connection less services • Flow control and error control • Encapsulation and de capsulation • Queuing
  • 13. Uses of UDP • They are suitable for simple communications where error control and flow control are little concern • They are suitable for multicasting • They are well suited for updating the router information.
  • 15. Reliable Byte Stream • In contrast to the unreliable transmission protocol we have a reliable byte stream . • Protocol used here is “Transmission Control Protocol” (TCP)
  • 16. TCP Services • Process to process communication • Stream delivery service • Full duplex communication • Connection oriented service • Reliable service
  • 17. 1. Process to process communication • There are few well known ports for the process identification.
  • 18. 2. Stream delivery service • The data are sent as a stream of bytes. • This creates an virtual connection between the source and the destination.
  • 19. • Full duplex communication: • TCP allows full duplex communication in which the data flow in both the directions at the same time. • Connection Oriented Services: • Data transmission occurs in 3 stages, • Connection is established between the source & destination • Data are exchanged between the source and destination • Connection is terminated. • Reliable Services: • TCP is an reliable protocol. • It uses an acknowledgement mechanism to check the safe and sound arrival of data
  • 20. Features of TCP • Numbering system: • They have 2 types of numbering system • Sequence number - to identify the order of the segment • Acknowledgement number – used to conform the reception of segment and the next segment to be sent. • Flow control: • Controls the amount of data sent by the sender to the receiver. To avoid the loss of packets • Error control: • TCP implements the error control mechanism to ensure the correct delivery of data. • Congestion control: • TCP implements certain strategies to ensure there is no congestion on the network.
  • 22. Connection Management in TCP • There are 3 phases in connection management. Connection Establishment Data transfer Connection termination
  • 23. 1. Connection Establishment • Connection is established by a 3 way handshaking process. • Consider the scenario shown in the figure, where client need to establish a connection with the server.
  • 24. 2. Data transfer • After the connection is established , data can flow in bi direction. • The client and server can send data and ACK • The figure shows the timing diagram for the data transfer phase.
  • 25. 3. Connection Termination • Connection termination also happens in 3 way handshaking process. • The client ends the termination by sending FIN signal and the same is acknowledged from the server.
  • 28. • TCP uses sliding window to handle the flow control • The major difference between the sliding window flow control in data link layer and the Transport layer is as follows • Byte oriented in TCP, Frame oriented in DLL • Window size is variable in TCP, Fixed in DLL • A window can be opened, Closed or Shrink.
  • 29. • Opening a window: • Moving the right wall to the right. This allows new bits to be added for sending. • Closing a window: • Moving left wall to the right. Represents that the bytes are acknowledged. • Shrinking a window: • Moving right wall to the left. Revoking the eligibility of bytes for sending. Problem occurs when the bytes are already sent.
  • 30. • Size of the window is determined by 2 parameters. • Receiver window (rwnd) – No of bytes that the receiver can accept. • Congestion window (cwnd) – No of bytes that the network can carry without any congestion. • The window size should be a function of rwnd and cwnd
  • 31. Transmission Process • There are 3 mechanisms in transmission process. Deciding the “Maximum Segment Size” (MSS) Flushing the bytes into the buffer. Firing the Timer for retransmission purpose.
  • 32. Silly Window Syndrome • Generally receiver decides the window size. • If the available data and receiver window size is same as MSS, no problem will occur. • In case the transmitter accumulates the data bytes and waiting for the window size from the receiver. • Now the receiver sends the window size as MSS/2 (Half the Size of the MSS). • Now the problem occurs at the transmitter that it has to send MSS/2 bytes of data….. Or to wait for some more period to get the full MSS window size. So that the complete data is transmitted. • This confusion leads to a problem called as “Silly Window Syndrome”. Solution for this problem is : “Nagle’s Algorithm”
  • 33. • If sender waits too long --> bad for interactive connections. • If it does not wait long enough --> silly window syndrome. • How to solve ?
  • 34. Nagle’sAlgorithm • If both available data and Window ≥ MSS, send full segment. • Else, if there is un ACK ed data in flight, buffer new data until ACK returns. • Else, send new data now.
  • 37. • Reliable data transmission is achieved by retransmitting the segments. • The key factor in implementing the retransmission is deciding the Time Out Period • The default method for setting up the Time out period is double the period of Round Trip Time between any 2 nodes on the network
  • 38. Problem with RTT • Unfortunately the RTT between any 2 nodes on the network gets varied because of several factors
  • 39. Solution • To eliminate this problem, TCP uses an “Adaptive Retransmission Technique”. • Where the Time out Period is adjusted according to the situations. • Several algorithms were proposed on calculating the time out period • Original Algorithm • Karn / Parteidge Algorithm • Jacobson / Karels Algorithm
  • 40. 1. Original Algorithm • This is an simple algorithm, in which the sample time is computed for every segment sent. • This sample time is related with the previously computed values and the final time out period is computed as shown below
  • 41. Drawbacks of Original Algorithm • RTT cannot be simply calculated only based on the received ACK. • We cannot identify the received ACK is for the original Transmission or the Retransmitted Segment • Consider the given scenarios. • Case 1: ACK Sent by the Receiver is lost – segment retransmitted – received ACK is assumed for the original transmission – Sample RTT is too long. • Case 2: ACK is delayed by the Received – Segment Retransmitted – received ACK is assumed for the retransmitted segment – Sample RTT is too short.
  • 42. 2. Karn / Parteidge Algorithm • This algorithm overcomes the drawback of the original algorithm. • This algorithm proposes that the RTT is computed only for the segments that are sent for the first time. (Not for the Retransmitted Segments) • The Final time out is computed based only on the sample RTT’s of first time sent segments
  • 43. 3. Jacobson / Karels Algorithm • This algorithm serves better than the predecessor method. • This algorithm considers the variance of sample RTT’s in to account. • Variance -- ?
  • 46.
  • 49. Congestion Control • It is very important factor to control the congestion on the network. • Congestion occurs when the network is overloaded. • Thus to control the congestion the flow of packets should be controlled according to the network capacity. • There are several techniques available. Out of which few techniques are discussed here. • Adaptive Increase and Multiplicative Decrease. • Slow Start • Fast Retransmit and Fast Recovery
  • 50. Adaptive Increase and Multiplicative Decrease. (AIDM) • TCP maintains the congestion window size which decides the amount of data to be transmitted. • The size of this window can be increased or decreased according to the occurrence of congestion on the network.
  • 51. Operation of AIDM • AIDM performs slow increase in the congestion window size when the congestion is less. • AIDM performs sudden drop in the congestion window size when there is a congestion on the network
  • 52. 2. Slow Start Method • The draw back with the previous method is that, the system take too long time to reach the optimum flow level. • This methods initially sets the window size to 1 and when the ACK is received, then it doubles the window size. • This method is well suited in 2 conditions • Initial stage of the transmission when the system do not know anything about the capacity of the network. • When the line is down for a while and again back on to service.
  • 53. Fast retransmit and Fast Recovery • Fast Retransmit: • The convention system waits for the time out period to retransmit the lost frame. • Instead to speed up the process Fast retransmit is used. • In this method the receivers send the previous copy of ACK to the sender to intimate the loss of packets. • When the receiver keeps on receiving the Duplicate ACK then the frame is Retransmitted. Packet 1 Packet 2 Packet 3 Packet 4 Packet 5 Packet 6 Retransmit packet 3 ACK 1 ACK 2 ACK 2 ACK 2 ACK 6 ACK 2 Sender Receiver
  • 54. • Fast Recovery: • This methods modifies the operation of slow start method. • This methods reduces the size of the congestion window to half, Instead of starting form the beginning. • This method helps in fast recovery of the system when there is any occurrence of congestion in the network.
  • 57. Introduction • The previously discussed control mechanisms measures the amount of congestion occurred in the network and take steps to control. • But it is always better to avoid congestion than controlling.
  • 58. Congestion avoidance Mechanisms • There are several congestion avoidance mechanisms proposed. Few of them are discussed here. • Destination experiencing Congestion Bit (DEC Bit) • Random Early Detection (RED). • Source Based Congestion Avoidance.
  • 59. DEC Bit • This system introduces an congestion bit to the packets transmitted by the sender. • This bit can either set or reset according to the congestion level. • This bit is set when the queue length if more than 50%. • When the receiver detects the congestion bit is set then the window size is reduced by 0.875 times the original value. • When the queue length is less than 50% then the congestion window size is incremented by 1 byte.
  • 60. Random Early Detection • This bit avoids congestion by dropping the packets. • This method measures the queue length and fixes minimum threshold and maximum threshold values.
  • 61. • When the queue length is below the minimum threshold value then no packets are dropped. • When the queue length lies between the minimum and maximum threshold values then the packets are dropped according to the predefined configuration. • When the queue length is above the maximum threshold level then all the packets are dropped.
  • 62.
  • 65. QoS - Introduction • Qos deals with the regular flow of data throughout the network. • There are several mechanisms incorporated to improve the QoS. • Scheduling • Traffic shaping • Admission control • Resource reservation.
  • 66. 1. Scheduling • Scheduling is nothing but prioritizing the various flow of packets. • There are 3 methods. • First In First Out Queuing (FIFO) • Priority Queuing • Weighted Priority Queuing
  • 70. 2. Traffic Shaping • This method regulates the flow of data from various rates of flow of packets. • This can be implemented by 2 techniques. • Leaky Bucket Mechanism • Token Bucket Mechanism
  • 73. Token Bucket Mechanism • Packets will be sent based on the token system • Each packet consumes one token. • The ideal time of the node are effectively utilised in this mechanism
  • 75. 3. Admission Control • Packets will be accepted or rejected based on the pre defined configuration. • If the packet passes the test then the packet is accepted. Else rejected.
  • 76. 4. Resource Reservation • Network resources like bandwidth, queue memory can be reserved before hand for priority applications .
  • 79. Application Requirements • It is first important to classify the types of application for choosing the requirements. • Real Time Applications • Non – Real Time Applicaations
  • 80. Real Time Applications • The best examples of real time applications are Audio transmission. • In this applications the minimum delay are most important requirement than any other parameters.
  • 81. Non Real time applications • Such kind of applications do not require minimum delay as the important requirement. • The parameters like security, correct delivery can be important requirements based on the applications • Email, FTP and HTTP are few examples of Non Real time Applications.
  • 82. Approaches for Deciding the QoS • There are 2 main approaches in providing the QoS. • Fine Grained Approach • Provides QoS for individual Applications • Coarse Grained Approach • Provides QoS for large class of data or Aggregate Traffic.